Pages that link to "Item:Q3384350"
From MaRDI portal
The following pages link to Covert Misappropriation of Networked Control Systems: Presenting a Feedback Structure (Q3384350):
Displaying 19 items.
- Securing state reconstruction under sensor and actuator attacks: theory and design (Q1987261) (← links)
- Towards quantifying the impact of randomly occurred attacks on a class of networked control systems (Q2011880) (← links)
- On the computational complexity of the secure state-reconstruction problem (Q2063856) (← links)
- Discrimination between replay attacks and sensor faults for cyber-physical systems via event-triggered communication (Q2068553) (← links)
- Attack-resilient state estimation with intermittent data authentication (Q2123199) (← links)
- Detecting stealthy integrity attacks in a class of nonlinear cyber-physical systems: a backward-in-time approach (Q2139375) (← links)
- Application of the unified control and detection framework to detecting stealthy integrity cyber-attacks on feedback control systems (Q2151862) (← links)
- A distributed FDI cyber-attack detection in discrete-time nonlinear multi-agent systems using neural networks (Q2157847) (← links)
- A unified modeling of muti-sources cyber-attacks with uncertainties for CPS security control (Q2224730) (← links)
- Event-triggered control for stochastic networked control systems against denial-of-service attacks (Q2663486) (← links)
- Resiliency in dynamic leader-follower multiagent systems (Q2663882) (← links)
- Geometrical Characterization of Sensor Placement for Cone-Invariant and Multi-Agent Systems against Undetectable Zero-Dynamics Attacks (Q5071033) (← links)
- A safety preserving control architecture for cyber‐physical systems (Q6089787) (← links)
- Performance based attack detection and security analysis for cyber‐physical systems (Q6190354) (← links)
- Secure state estimation and actuator attack reconstruction for cyber‐physical systems based on sliding‐mode observer (Q6194720) (← links)
- Network steganography based security framework for cyber-physical systems (Q6203495) (← links)
- Identification and analysis of stochastic deception attacks on cyber-physical systems (Q6542601) (← links)
- The sensor-actuators stealthy cyber-attacks framework on networked control systems: a data-driven approach (Q6583330) (← links)
- A data-driven safety preserving control architecture for constrained cyber-physical systems (Q6664706) (← links)